Skip to main content

One Identity Active Roles Server

Connector name

agtars

Connector type

Executable

Type (UI field value)

One Identity Active Roles

Target system versions supported / tested

The agtars connector is known to work with versions 7.1 and 7.3 of One Identity Active Roles; other versions may work.

Connector status / support

Customer-Verified

Clients may contact Bravura Security support for assistance with this connector. Troubleshooting and testing must be completed in the client's test environment as Bravura Security does not maintain internal test environments for the associated target system.

 

The following Bravura Security Fabric operations are supported by this connector (depending on your product license and version):

  • user change password

  • expire password

  • check password expiry

  • administrator reset password

  • unlock account

  • check account lock

  • create account

  • delete account

  • disable account

  • enable account

  • check account enabled

  • create group

  • delete group

  • add user to group

  • delete user from group

  • add group to group

  • remove group from group

  • get server information

  • add owner(user) to group

  • remove owner(user) from group

  • add owner(group) to group

  • remove owner(group) from group

  • List:

    • accounts

    • attributes

    • groups

    • members

    • computer objects

For a full list and explanation of each connector operation, see connector operations.

Preparation

Before you can target One Identity Active Roles Server, you must:

  1. Provide access to Active Roles Management Shell.

  2. Set up target system administrator(s)

  3. Create at least one template account

Setting up access to Active Roles Management Shell

When listing accounts from Active Roles Server remotely, access to Active Roles Management Shell is required.

On the Active Roles Server:

  1. Add the Active Roles target system administrator into following local user groups by using server manager:

    • Remote Desktop Users

    • WinRMRemoteWMIUsers__

    • WSS_ADMIN_WPG

    Note

    Local group WinRMRemoteWMIUsers__ is not installed by default in Windows later versions, such as Windows 2016. It can be added by using command:

    net localgroup /add WinRMRemoteWMIUsers__

  2. Launch Active Roles Management Shell as an Administrator.

  3. Execute the following command to enable Windows Remote Management (WinRM):

    Enable-PSRemoting -Force

  4. Execute the following command to enable Credential Security Support Provider (CredSSP) authentication on the Active Roles Server:

    Enable-WSManCredSSP -Role Server

To configure the client computer where the connector(agtars) is installed:

  • If the connector (agtars) is installed on Bravura Security Fabric server:

    1. Launch Windows PowerShell as an Administrator.

    2. Execute the following command to enable Credential Security Support Provider (CredSSP) authentication:

    Enable-WSManCredSSP -Role client -DelegateComputer "<ARS server name>"

  • If the connector (agtars) is installed on the Active Roles Server:

    1. Install Proxy Service (psproxy) on the Active Roles Server.

    2. Install Connector Pack, which should match the setup of Bravura Security Fabric server Connector Pack.

Creating a template account

Bravura Security Fabric uses template accounts as models or "blueprints" for creating new accounts in One Identity Active Roles Server.

Setting up target system administrator(s)

Bravura Security Fabric uses designated account(s) on One Identity Active Roles Server to perform Bravura Security Fabric operations.

The target system administrator must be a member of the Domain Administrators group from the domain the Active Roles Server manages, and a member of the Active Roles Admin group if the connector accesses the Active Roles Server remotely.

Targeting One Identity Active Roles system

For each One Identity Active Roles Server, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems):

  • Type is One Identity Active Roles.

  • Address uses options described in the table below.

Table 1. One Identity Active Roles address configuration

Option

Description

Options marked with a redstar.png are required.

Domain redstar.png

The domain that the One Identity Active Roles Server manages.

(key: domain)

Server

The Active Roles Server hostname or IP address.

(key: svr)

OUs to list users from

List only those OUs that exist in one or more containers.

(key: listOUs)

Connect to local ARS Server

Connect to ARS server or domain controller. Default is connect to domain controller.

(key: arsonly)

Poll time after create

Time in seconds that the product server will check the Active Roles Server to confirm the new account creation. The default is 5 seconds.

(key: polltime)

Connector fail on invalid user

If the server does not find the new account within the poll time, a message will appear in the system log.

(key: failOnInvalidUser)



The address is entered as follows:

{domain=<domain name>/[;svr=<ARS server name>;][listOUs={<OUs>};][arsonly=true|false;][polltime=<N>;][failOnInvalidUser=true|false]}

Setting the administrator credentials

A One Identity Active Roles target system requires one or two administrative credentials depending on whether the connector accesses Active Roles Server locally or remotely.

  • If the connector accesses an Active Roles Server locally, fox example, the Active Roles Server connector is installed on Active Roles Server via proxy, the Administrator ID should be set to a domain administrator account, using the domain name followed by a backslash, then the domain administrator name, for example:

    domain-name\administrator

  • If the connector accesses an Active Roles Server remotely, two sets of administrator credentials are required:

    • A domain administrator account, which is the same as above. The System password option should be checked.

    • A member of Active Roles Admin account.

Accessing Active Roles Server remotely requires additional configuration on both the Active Roles Server and the Bravura Security Fabric server where the Active Roles connector is installed. See Setting up access to Active Roles Management Shell .